ID

VAR-200703-0141


CVE

CVE-2007-1222


TITLE

Mac For Parrallels Desktop Vulnerable to writing files to the host file system

Trust: 0.8

sources: JVNDB: JVNDB-2007-003450

DESCRIPTION

Parallels Desktop for Mac before 20070216 implements Drag and Drop by sharing the entire host filesystem as the .psf share, which allows local users of the guest operating system to write arbitrary files to the host filesystem, and execute arbitrary code via launchd by writing a plist file to a LaunchAgents directory. ---------------------------------------------------------------------- Secunia is proud to announce the availability of the Secunia Software Inspector. The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor. Try it out online: http://secunia.com/software_inspector/ ---------------------------------------------------------------------- TITLE: Parallels Desktop for Mac Shared Folder Security Issue SECUNIA ADVISORY ID: SA24171 VERIFY ADVISORY: http://secunia.com/advisories/24171/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: Local system SOFTWARE: Parallels Desktop for Mac http://secunia.com/product/12498/ DESCRIPTION: Rich Mogull has reported a security issue in Parallels Desktop for Mac, which can be exploited by malicious software to bypass certain security restrictions. The problem is that the Drag-and-Drop functionality of the VM (virtual machine) is implemented via a shared folder with "read-write" access to the host system. This can be exploited to write or manipulate files on the host system e.g. by malware in the VM. SOLUTION: Disable Drag-and-Drop. PROVIDED AND/OR DISCOVERED BY: Rich Mogull ORIGINAL ADVISORY: http://lists.immunitysec.com/pipermail/dailydave/2007-February/004091.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.8

sources: NVD: CVE-2007-1222 // JVNDB: JVNDB-2007-003450 // VULHUB: VHN-24584 // PACKETSTORM: 54706

AFFECTED PRODUCTS

vendor:parallelsmodel:desktopscope:eqversion:*

Trust: 1.0

vendor:parallelsmodel:desktopscope:ltversion:20070216

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.4.9

Trust: 0.6

sources: JVNDB: JVNDB-2007-003450 // CNNVD: CNNVD-200703-095 // NVD: CVE-2007-1222

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1222
value: HIGH

Trust: 1.0

NVD: CVE-2007-1222
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200703-095
value: HIGH

Trust: 0.6

VULHUB: VHN-24584
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-1222
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-24584
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-24584 // JVNDB: JVNDB-2007-003450 // CNNVD: CNNVD-200703-095 // NVD: CVE-2007-1222

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-1222

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200703-095

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200703-095

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-003450

PATCH

title:Parallels Desktopurl:http://www.parallels.com/jp/products/desktop/

Trust: 0.8

sources: JVNDB: JVNDB-2007-003450

EXTERNAL IDS

db:NVDid:CVE-2007-1222

Trust: 2.5

db:SECUNIAid:24171

Trust: 1.8

db:OSVDBid:33799

Trust: 1.7

db:JVNDBid:JVNDB-2007-003450

Trust: 0.8

db:CNNVDid:CNNVD-200703-095

Trust: 0.7

db:MLISTid:[DAILYDAVE] 20070216 MINOR VIRTUALIZATION VULNERABILITY

Trust: 0.6

db:BIDid:83568

Trust: 0.1

db:VULHUBid:VHN-24584

Trust: 0.1

db:PACKETSTORMid:54706

Trust: 0.1

sources: VULHUB: VHN-24584 // JVNDB: JVNDB-2007-003450 // PACKETSTORM: 54706 // CNNVD: CNNVD-200703-095 // NVD: CVE-2007-1222

REFERENCES

url:http://lists.immunitysec.com/pipermail/dailydave/2007-february/004091.html

Trust: 1.8

url:http://osvdb.org/33799

Trust: 1.7

url:http://secunia.com/advisories/24171

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1222

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1222

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/software_inspector/

Trust: 0.1

url:http://secunia.com/product/12498/

Trust: 0.1

url:http://secunia.com/advisories/24171/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

sources: VULHUB: VHN-24584 // JVNDB: JVNDB-2007-003450 // PACKETSTORM: 54706 // CNNVD: CNNVD-200703-095 // NVD: CVE-2007-1222

CREDITS

Secunia

Trust: 0.1

sources: PACKETSTORM: 54706

SOURCES

db:VULHUBid:VHN-24584
db:JVNDBid:JVNDB-2007-003450
db:PACKETSTORMid:54706
db:CNNVDid:CNNVD-200703-095
db:NVDid:CVE-2007-1222

LAST UPDATE DATE

2025-04-10T23:19:13.804000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-24584date:2008-11-15T00:00:00
db:JVNDBid:JVNDB-2007-003450date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200703-095date:2007-03-06T00:00:00
db:NVDid:CVE-2007-1222date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-24584date:2007-03-02T00:00:00
db:JVNDBid:JVNDB-2007-003450date:2012-09-25T00:00:00
db:PACKETSTORMid:54706date:2007-02-27T16:54:22
db:CNNVDid:CNNVD-200703-095date:2007-03-02T00:00:00
db:NVDid:CVE-2007-1222date:2007-03-02T22:19:00